An Examination Whether the Latest AI Products are Anything More Than Powerful New Tools If you work in security or even tech, odds are you can’t stop hearing about recent advancements in artificial intelligence and how they will be humankind’s undoing. With the introduction of products like ChatGPT, OpenAI, or ChatSonic, it’s undeniable that the… Read more »
What We Can Expect in 2023 Based on the Past Year’s Threat Landscape As we gear up for the holidays and new year, it is that time of the year again to review this year’s security-related events and examine the themes for future security challenges we can expect in the coming year that may affect… Read more »
Hear from a DirectDefense consultant about an internal network penetration test that involved an iSCSI exploitation.
Well-configured endpoint security is critical to protect against a ransomware attack or a security breach, and requires some extra attention.
Navigating the 5 Stages of Grief Following an Incident Response Event Are you a victim of a data breach and are you feeling signs of grief? You’re not alone. As an incident response professional, I have met many different types of corporate staff, from the IT staff to the C-suite. Unfortunately, it was probably on… Read more »
It’s time to rethink your password policy to prevent modern password attacks. If you think your company’s policy of requiring passwords to have a minimum length of eight characters, in addition to other complexity requirements, is sufficient to effectively prevent modern password attacks, think again. Our client, a global corporation with business units in more… Read more »
What to Know, How to Prepare, and How We Got Here When 2021 began, everything from the pandemic to the economy felt uncertain. Security threats increased both as a result of those uncertainties and the ever-growing sophistication of the threat landscape. In this post, we’ll review the events that created security threats in 2021 and… Read more »
Tighten Cybersecurity Controls Before the Next Ransomware Attack Comes to You Food production is highly regulated by the Federal Food & Drug Administration (FDA) and U.S. Department of Agriculture (USDA) to ensure food safety. However, the computer systems that are used to accomplish and maintain food safety processes don’t fall under the purview of those… Read more »
The recent ransomware attack at meat processor JBS SA proves the need for a business continuity and disaster recovery plan.
The Colonial Pipeline shutdown should be seen as a serious incident pointing to the precariousness of critical infrastructure security.